Patent application number | Description | Published |
20120110563 | DYNAMIC APPLICATION IDENTIFIER FOR USE IN AN UPDATE WORKFLOW - During an update technique, an update for the software application is received from a provider of the software application. Then, update information is either received from the provider or is generated. This update information specifies an update relationship between the update and at least a previous version of the software application. Next, inventory information associated with a portable electronic device is accessed (such as whether the previous version of the software application is currently installed on the portable electronic device). In response to the accessed inventory information, an identifier associated with the update is dynamically generated, and the update and the dynamically generated identifier are provided to the portable electronic device. Using the dynamically generated identifier, an application management system or the operating system installed on the portable electronic device determines whether an update workflow is executed. | 05-03-2012 |
20120110564 | UPDATE WORKFLOW IN A PORTABLE DEVICE BASED ON METADATA - During an update technique, an update to a software application is received from a provider of a software application. Then, update information is either received from the provider or is generated. This update information, which is other than an application identifier and a version number associated with the update, specifies an update relationship between the update and at least a previous version of the software application. Subsequently, configuration information (such as whether the previous version of the software application is currently installed on a portable electronic device) is received from the portable electronic device. In response to the received configuration information, the update is provided to the portable electronic device along with update information. Using the update information, an application management system or the operating system installed on the portable electronic device determines whether an update workflow is executed. | 05-03-2012 |
20120128154 | ESTABLISHING A SECURE PROXIMITY PAIRING BETWEEN ELECTRONIC DEVICES - A technique for establishing a common encrypted link between a first electronic device and a second electronic device in physical proximity in a system is described. During operation of the system, a user of a first electronic device in the system provides a notification that initiates secure device pairing. In response to the notification, the first electronic device conducts a first key exchange in an audible audio spectrum to the second electronic device in the system using a first zero-knowledge protocol. After the first key is received by the second electronic device, the second electronic device conducts a second key exchange in the audible audio spectrum to the first electronic device using a second zero-knowledge protocol, thereby establishing the common encrypted link between the first electronic device and the second electronic device. | 05-24-2012 |
20120180036 | CUSTOMIZATION OF MOBILE-APPLICATION DELIVERY - A technique for facilitating customization of a software application is described. During this customization technique, an indicator, which indicates that a software application for an electronic device has been discovered by a user, is provided to a publisher of the software application. In response to the indicator, the publisher provides a token to the user. This token identifies a customized application-delivery service for the software application and/or a user-specific customization of the software application. Note that the customized application-delivery service and the user-specific customization are based on information about the user associated with the user's pre-existing or just-established relationship with the publisher. Next, the token is provided to an application-delivery service, and the application-delivery service provides the customized software application to the electronic device or a computer, for example, using the customized application-delivery service. | 07-12-2012 |
20120254001 | METHOD AND SYSTEM FOR PROVIDING AN AGREEMENT WITNESS SERVICE - A method and system for providing an agreement witness service whereby when two parties desire to enter into an agreement/transaction, a first party provides contact data for a first party computing system and the second party sends an “agreement acknowledgement request message” to a witness service provider system. The witness service provider system then generates an agreement code and attaches the agreement code to the agreement acknowledgement request message, thereby transforming the agreement acknowledgement request message into an “agreement acknowledgement message”. The agreement acknowledgement message is then sent to the first party. The first party then provides the agreement code to the second party and the agreement code is stored as evidence of the first party's acknowledgement of the agreement/transaction. | 10-04-2012 |
20120290376 | PROCESSING ELECTRONIC PAYMENT INVOLVING MOBILE COMMUNICATION DEVICE - Mobile payments and processing data related to electronic transactions. A near field communication connection is established between a mobile communication device of a consumer that serves as a mobile wallet and an electronic payment device of a merchant. Authorization data is shared between the mobile communication device and the electronic payment device without providing electronic payment instrument (e.g. credit card) data to the merchant. Authorization data is transmitted from the mobile communication device to a cloud computer or resource that serves as a cloud wallet and hosts respective data of respective electronic payment instruments of respective consumers, and from the electronic payment device a payment processor computer. The payment processor computer presents the authorization data to the cloud wallet, and in response, the cloud wallet transmits the credit card data to the payment processor computer, which processes the transaction. | 11-15-2012 |
20120324559 | ESTABLISHING A SECURE CONNECTION BASED ON A JOINT GESTURE - During a transaction, an electronic device (such as a cellular telephone) captures a gesture performed by a user of the electronic device. This gesture is analyzed to determine salient features, such as accelerations of the electronic device during the gesture and associated time intervals. Then, the electronic device generates a token based on the salient features, and provides the token to a server. When a second token, associated with the token, is received by the server from a second electronic device, the server establishes a secure connection between the electronic device and the second electronic device. | 12-20-2012 |
20130179353 | SECURE FINANCIAL TRANSACTIONS USING MULTIPLE COMMUNICATION TECHNOLOGIES - During a financial technique, electronic devices may exchange, using a first communication technique, information with each other to establish a secure connection between the electronic devices when they are proximate to each other. After the secure connection is established, the electronic devices may hand off communication with each other from the first communication technique to a second communication technique that supports communication at a higher data rate and over longer distances than the first communication technique. Moreover, the electronic devices may communicate, using the second communication technique and the secure connection, additional information associated with the financial transaction with each other to facilitate completion of the financial transaction. | 07-11-2013 |
20130185123 | METHOD AND SYSTEM FOR AUTOMATED TRANSPORTATION USE TRACKING AND BILLING - A user registers with an automated transportation use and billing system. The user's geographical location/position is monitored and periodically compared with the geographical location/position of one or more public transportation systems. When a determination is made that the user's geographical location/position is the same as the geographical location/position of a public transportation system, an assumption is made that the user is making use of the public transportation system and once the user's geographical location/position data differs from the public transportation system's geographical location/position data, it is further assumed that the user is no longer making use of the public transportation system. Data indicating the users assumed use of the public transportation system, calculated as described above, is then recorded and credited to the user's account. | 07-18-2013 |
20130198518 | SECURE PEER DISCOVERY AND AUTHENTICATION USING A SHARED SECRET - During a security technique, an electronic device determines a name by a applying a function to a shared secret, which is shared between a user and another user. This name is advertised in a network. After discovery by another electronic device (which is associated with the other user), the electronic device generates a first encrypted message from an unencrypted message using a cryptographic key. The electronic device provides the first encrypted message to the other electronic device, and receives a second encrypted message from the other electronic device. Using the cryptographic key, the electronic device decrypts the second encrypted message. Moreover, the electronic device receives confirmation that the other electronic device was able to decrypt the first encrypted message, thereby authenticating that the secure connection has been established. | 08-01-2013 |
20130332293 | MOBILE PAYMENT VIA A VIRTUAL PERIPHERAL DEVICE - During a financial transaction, a customer provides a token that identifies the customer to a peripheral device (which is other than a credit-authorization terminal or a magnetic-stripe reader) coupled to the point-of-sale terminal. Then, a unified point-of-sale service object executing on the point-of-sale terminal, which is a driver for a virtual peripheral device, performs one or more operations based on at least the token to obtain financial information associated with the customer. After providing the financial information and transaction information associated with the financial transaction to a financial institution specified in the financial information, the point-of-sale terminal receives a confirmation from the financial institution that the financial transaction has been completed. For example, the confirmation may be received via a credit-authorization-terminal service object that is a driver for the credit-authorization terminal. | 12-12-2013 |
20130346222 | MOBILE PAYMENT SYSTEM - During a financial transaction, a customer provides an identifier to a peripheral device (which may be a barcode scanner, a wireless receiver or a keyboard) coupled to the point-of-sale terminal. This identifier corresponds to a one-time payment credential token that includes financial information of the customer. Then, a service object executing on the point-of-sale terminal, which acts as a driver for the peripheral device, performs one or more operations based on at least the identifier to obtain the financial information. After providing the financial information and transaction information associated with the financial transaction to a financial institution specified in the financial information, the point-of-sale terminal receives a confirmation from the financial institution that the financial transaction has been completed. | 12-26-2013 |
20140089186 | MOBILE PAYMENT SERVICE FOR SMALL FINANCIAL INSTITUTIONS - During operation of the system, a user of a portable electronic device provides a request to enroll in a financial service associated with a provider. For example, the financial service may facilitate financial transactions via a financial application that executes on the portable electronic device. Then, an electronic device determines that the user is an existing customer of at least one of a set of financial institutions that have a business relationship with the provider, where the provider is other than one of the financial institutions. Next, the electronic device enrolls the user in the financial service without requesting additional information from the user. By leveraging the business relationship between the user and one of the financial institutions in the set of financial institutions, the user can avoid having to perform a complicated enrollment process in order to start using the financial service. | 03-27-2014 |
20140344085 | METHOD AND SYSTEM FOR PRESENCE BASED MOBILE PAYMENT - A method for presence based mobile payment comprises receiving, from a user, a request for registration with a mobile payment service, registering, by the mobile payment service, the user based on the request, broadcasting, by a point of sale (PoS) system and through an advertising channel, an identification of a transaction, wherein the transaction comprises an item, wherein the advertising channel is used for discovery of available devices, and wherein the user is purchasing the item at the PoS system, receiving, from a mobile device of the user, a payment authorization for the transaction, and facilitating, by the mobile payment service, payment for the transaction. | 11-20-2014 |
Patent application number | Description | Published |
20080212484 | Tracing connection paths through transparent proxies - In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies includes generating a trace packet at the source node, transmitting the trace packet over the network towards the destination node, and receiving trace response packets in response to transmission of the trace packet. The trace response packets include a packet from the destination node and a packet from each of the transparent proxies in a data path from the source node to the destination node. Each of the packets from the transparent proxies includes an identifier of the transparent proxy transmitting the packet. The method further includes identifying the transparent proxies in the connection path based on information in the trace response packets. An apparatus for tracing a connection path is also disclosed. | 09-04-2008 |
20080235508 | Reducing processing load in proxies for secure communications - In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a session key to use with communications between the client and the proxy and between the proxy and the server. Encrypted data may then be received from the client at the proxy. The proxy can decrypt the encrypted data for processing using the session key. In one embodiment, the decrypted data is not altered. The proxy then sends the encrypted data that was received from the client to the server without re-encrypting the data that was decrypted. Because the proxy did not alter the data in its processing of the decrypted data and the same session key is used between communications for the proxy and the server, the encrypted data stream that was received from the client can be forwarded to the server. | 09-25-2008 |
20090319600 | OPTIMIZING PROGRAM REQUESTS OVER A WIDE AREA NETWORK - In various embodiments, data processing apparatus, software, or machine-implemented methods can optimize NFSv3 asynchronous write requests or MSRPC calls that traverse a wide area network, for example, by receiving, from a client, a first request directed to a server across a wide area network; determining whether a related second request has been received previously; when a related second request has been received previously, sending, to the client, a first reply to the second request and forwarding the first request to the server, and otherwise forwarding the first request to the server without sending any reply to the client for the first request. Sending local replies from a WAN optimizer induces the client to send continuous requests, improving throughput, but at least one client request remains unreplied to, and one server error reply is always reported to the client, facilitating correct error processing at the client. | 12-24-2009 |
20100061253 | Tracing connection paths through transparent proxies - In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies includes generating a trace packet at the source node, transmitting the trace packet over the network towards the destination node, and receiving trace response packets in response to transmission of the trace packet. The trace response packets include a packet from the destination node and a packet from each of the transparent proxies in a data path from the source node to the destination node. Each of the packets from the transparent proxies includes an identifier of the transparent proxy transmitting the packet. The method further includes identifying the transparent proxies in the connection path based on information in the trace response packets. An apparatus for tracing a connection path is also disclosed. | 03-11-2010 |
20120233453 | Reducing Processing Load in Proxies for Secure Communications - In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a session key to use with communications between the client and the proxy and between the proxy and the server. Encrypted data may then be received from the client at the proxy. The proxy can decrypt the encrypted data for processing using the session key. In one embodiment, the decrypted data is not altered. The proxy then sends the encrypted data that was received from the client to the server without re-encrypting the data that was decrypted. Because the proxy did not alter the data in its processing of the decrypted data and the same session key is used between communications for the proxy and the server, the encrypted data stream that was received from the client can be forwarded to the server. | 09-13-2012 |
Patent application number | Description | Published |
20090321056 | MULTI-STAGE ELECTROHYDRODYNAMIC FLUID ACCELERATOR APPARATUS - Multi-stage electrohydrodynamic (MHD) fluid flow acceleration is described. In some embodiments, an EHD fluid accelerator apparatus includes a substrate for thermal conduction and a plurality of electrode structures for thermal conduction therethrough, wherein each electrode structure has a collector electrode portion and a corona discharge electrode portion. | 12-31-2009 |
20100052540 | ELECTROHYDRODYNAMIC FLUID ACCELERATOR DEVICE WITH COLLECTOR ELECTRODE EXHIBITING CURVED LEADING EDGE PROFILE - Performance of an electrohydrodynamic fluid accelerator device may be improved and adverse events such as sparking or arcing may be reduced based, amongst other things, on electrode geometries and/or positional interrelationships of the electrodes. For example, in a class of EHD devices that employ a longitudinally elongated corona discharge electrode (often, but not necessarily, a wire), a plurality of generally planar, collector electrodes may be positioned so as to present respective leading surfaces toward the corona discharge electrode. The generally planar collector electrodes may be oriented so that their major surfaces are generally orthogonal to the longitudinal extent of the corona discharge electrode. In such EHD devices, a high intensity electric field can be established in the “gap” between the corona discharge electrode and leading surfaces of the collector electrodes. | 03-04-2010 |
20100116460 | SPATIALLY DISTRIBUTED VENTILATION BOUNDARY USING ELECTROHYDRODYNAMIC FLUID ACCELERATORS - In thermal management systems that employ EHD devices to motivate flow of air through an enclosure, spatial distribution of a ventilation boundary may facilitate reductions in flow resistance by reducing average transit distance for cooling air from an inlet portion of the ventilation boundary to an outlet portion. Some thermal management systems described herein distribute a ventilation boundary over opposing surfaces, adjacent surfaces or even a single surface of an enclosure while providing a short, “U” shaped, “L” shaped or generally straight through flow path. In some cases, spatial distributions of the ventilation boundary facilitate or enable enclosure geometries for which conventional fan or blower ventilation would be impractical. In some cases, provision of multiple portions of the ventilation boundary may allow the thermal management system to tolerate blockage or occlusion of a subset of the inlet and/or outlet portions and, when at least some of such portions are non-contiguous spatially-distributed, tolerance to a single cause of blockage or occlusion is enhanced. | 05-13-2010 |
20100116464 | REVERSIBLE FLOW ELECTROHYDRODYNAMIC FLUID ACCELERATOR - Reversible flow may be provided in certain EHD device configurations that selectively energize corona discharge electrodes arranged to motivate flows in generally opposing directions. In some embodiments, a first set of one or more corona discharge electrodes is positioned, relative to a first array of collector electrode surfaces, to when energized, motivate flow in a first direction, while second set of one or more corona discharge electrodes is positioned, relative to a second array of collector electrode surfaces, to when energized, motivate flow in a second direction that opposes the first. In some embodiments, the first and second arrays of collector electrode surfaces are opposing surfaces of individual collector electrodes. In some embodiments, the first and second arrays of collector electrode surfaces are opposing surfaces of respective collector electrodes. | 05-13-2010 |
20100116469 | ELECTROHYDRODYNAMIC FLUID ACCELERATOR WITH HEAT TRANSFER SURFACES OPERABLE AS COLLECTOR ELECTRODE - In thermal management systems that employ EHD devices to motivate flow of air between ventilated boundary portions of an enclosure, it can be desirable to have some heat transfer surfaces participate in electrohydrodynamic acceleration of fluid flow while providing additional heat transfer surfaces that may not. In some embodiments, both collector electrodes and additional heat transfer surfaces are thermally coupled into a heat transfer path. Collector electrodes then contribute both to flow of cooling air and to heat transfer to the air flow so motivated. The collector electrodes and additional heat transfer surfaces may be parts of a unitary, or thermally coupled, structure that is introduced into a flow path at multiple positions therealong. In some embodiments, the collector electrodes and additional heat transfer surfaces may be proximate each other along the flow path. In some embodiments, the collector electrodes and additional heat transfer surfaces may be separate structures. | 05-13-2010 |
20100155025 | COLLECTOR ELECTRODES AND ION COLLECTING SURFACES FOR ELECTROHYDRODYNAMIC FLUID ACCELERATORS - Embodiments of electrohydrodynamic (EHD) fluid accelerator devices utilize collector electrode structures that promote efficient fluid flow and reduce the probability of arcing by managing the strength of the electric field produced at the forward edges of the collector electrodes. In one application, the EHD devices dissipate heat generated by a thermal source in a thermal management system. | 06-24-2010 |
20110149252 | Electrohydrodynamic Air Mover Performance - Structures for reducing the effect of charged surfaces near the electrodes on the performance efficiency of an electrohydrodynamic (EHD) device are disclosed. The potential levels on surfaces of an electronic device near the EHD electrodes are varied with respect to a function of the combination of distance from the emitter and the distance from the collector. The potential levels may be constant, may vary in discrete steps, may be continuously variable along the length between the EHD electrodes and beyond the electrodes, and may vary with respect to time. | 06-23-2011 |